LinuxCommandLibrary

amass

Attack surface mapping and asset discovery

TLDR

Enumerate subdomains passively

$ amass enum -passive -d [example.com]
copy
Active enumeration with DNS resolution
$ amass enum -active -d [example.com]
copy
Enumerate with output file
$ amass enum -d [example.com] -o [output.txt]
copy
Use all sources for maximum coverage
$ amass enum -d [example.com] -src -ip
copy

SYNOPSIS

amass command [options]

DESCRIPTION

amass is an OWASP project for in-depth attack surface mapping and asset discovery. It performs DNS enumeration, subdomain brute-forcing, and leverages numerous data sources including search engines, certificate transparency logs, and APIs.
The tool builds a comprehensive map of an organization's external network footprint, identifying subdomains, related domains, and network blocks.

PARAMETERS

enum

Perform enumeration and network mapping
intel
Collect intelligence on target organization
track
Track changes to discovered infrastructure
db
Manage the graph database
viz
Visualize collected data
-d domain
Target domain
-passive
Only use passive data sources (no DNS queries)
-active
Use active methods including DNS brute-forcing
-ip
Show IP addresses of discovered names
-src
Show source of each discovered name
-brute
Enable subdomain brute-forcing
-o file
Output file path
-dir path
Directory for output files
-config file
Configuration file

CONFIGURATION

~/.config/amass/config.ini

Main configuration file for data sources, API keys, and enumeration settings.

CAVEATS

Active enumeration generates significant DNS traffic and may be detected. Many data sources require API keys for full access. Results vary based on configured sources.

HISTORY

amass was created by Jeff Foley and became an official OWASP project. It gained widespread adoption in the security community for reconnaissance and bug bounty hunting.

SEE ALSO

subfinder(1), dnsenum(1), nmap(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community